Audit Commission develops Knowledge Programme with Verity K2E
EPSOM, UK - 2002-10-21 - The Audit Commission, an independent body responsible for ensuring that public money is used economically, efficiently and effectively, will launch its new intranet using Verity's advanced search and content organisation software, Verity(r) K2 Enterprise 4.5 (K2E). The intranet, part of a wider Knowledge Programme, will enable the Audit Commission's 2,500 employees to make the best use of its vast information resources.
Unlike other specialised regulatory organisations, the Audit Commission carries out audits, inspections and research projects across a wide range of the UK's public services. Before Verity, the Audit Commission was using a basic search engine, which was not capable of managing such a diverse and complex range of documents to the Commission's full requirements.
"We hold a unique collection of information here and we recognised that we could use it better to help our staff, clients and the public," says Mike Ibbitson, Knowledge Management programme manager, Audit Commission. "The aim of the Knowledge Programme is to develop a system that will enable us to harness and maximise the use of our combined knowledge. Having a top quality search and classification solution is absolutely key to this."
Verity K2 Enterprise will be used on the Audit Commission intranet to search and organise hundreds of thousands of documents from across the public sector, including health, local government, police and crime. Rather than being simply a back catalogue function, Verity is also working with the Audit Commission to develop an extranet facility and collaboration tools to make it easier for people to share information. It is also intended that Verity power the search on the internet site.
"During our procurement phase, Verity proved itself to be capable of meeting demanding requirements in terms of search set-up, depth of query language, spidering processes, classification, flexibility and installation routine," continues Ibbitson. "Verity has also proved that it can adapt to the specific needs of the Audit Commission, giving us the functionality we need today and the option to include additional functionality in the future."
Simon Atkinson, Managing Director of Verity GB adds: "Verity takes disparate sources of complex information then organises and classifies it so that users can find what they want quickly and share knowledge easily. There is a tremendous wealth of knowledge within the Audit Commission and Verity is helping to unlock some of that knowledge and in turn helping the employees within the organisation to use it more effectively."
About Verity K2 Enterprise
Verity K2E fully integrates the three tiers of knowledge management infrastructure. According to Forrester Research, these are search, taxonomy and personalisation. Verity is able to combine these crucial capabilities because of the three-tier architecture of its K2 technology platform, used by more than 1,500 companies worldwide. The K2 platform lets K2E users discover, organise and connect with their enterprises' greatest information assets - an array of documents and the experts behind them, who know and understand those businesses. It also offers one of the most sophisticated, yet easy to manage administrative infrastructures to better cope with enterprise complexity.
About the Audit Commission
The Audit Commission is responsible for ensuring that public money is used economically, efficiently and effectively. Its aim is to be a driving force in the improvement of public services. It promotes proper stewardship and governance and helps those responsible for public services to achieve effective outcomes for users and the public.
The Audit Commission is a non-departmental public body sponsored by the Department of Transport, Local Government and the Regions with the Department of Health and the National Assembly for Wales. The Audit Commission has agreed a framework document with its sponsoring departments, and the Commission's Controller acts as its accounting officer.
About Verity
Verity, Inc. (Nasdaq VRTY) is a leading provider of business portal infrastructure software. Verity software gives businesses a multitude of ways to improve access to vital information and perform a range of e-business operations, while enhancing the end-user experience. Verity-powered business portals, which include corporate intranets used for sharing information within an enterprise; e-commerce sites for online selling; and market exchange portals for B2B activities, all provide personalised information to employees, partners, customers and suppliers.
Verity products are used by approximately 80 percent of the Fortune 50 and by more than 1,500 corporations in various markets. Customers include ABB Group, AT&T, B&Q, BT, Cap Gemini Ernst & Young, Cisco, the European Commission, the Financial Times, GlaxoSmithKline, HSBC.com, KPMG, RS Components, Thomas Cook and UBS Warburg.
In 2001, Delphi Group named Verity the market leader in portal infrastructure software and Ovum named Verity the established leader in the enterprise search and OEM search.
Verity's headquarters are in Sunnyvale, California.
For more information, contact Verity at info@verity.com or at World Wide Web site http://www.verity.com or call 408-541-1500.
Verity and the Verity logo are registered trademarks or trademarks of Verity, Inc.
Summary: ...articulates and recommends HIV/ AIDS and STD-related policies and positions for the consideration of the Department of Public Health and the Los Angeles County Board of Supervisors. 2 Case study | Los Angeles Public Health HIV/STD Program It serves as a liaison with policy makers, and local and national...
Summary: ...Transnet National Port Authority uses Autonomy to protect critical data - case study. Organization background Transnet National Port Authority is one of five operating divisions of Transnet SOC Ltd, a state-owned enterprise in South Africa, responsible for the safe, effective and efficient economic functioning...
Summary: ...IDOL has also been used by the Economic Crime Unit (ECU) to identify perpetrators as part of its serious fraud investigations. Thanks to IDOL, the Force Intelligence Bureau Organised Crime division has been able to identify an additional 67 unlinked incidents relating to firearms, grievous bodily harm...
Summary: ...Customer The Phytosanitary Administration of the Republic of Slovenia (PARS), a part of the Ministry of Agriculture, Forestry and Food is the central authority for phytosanitary issues in Slovenia. It is responsible for all matters relating to plant health, registration of plant protection products, control...
Summary: ...Metropolitan Police leverage social media to engage local community. Case study Metropolitan Police leverage social media to engage local community HP solution enables UK’s leading police force to better engage community and respond to local events Industry UK Public sector Objective Create the means...
Summary: ...could pick it up and run with it. It was also the lowest cost solution.” Gary Pettigrove, CIO, ANAO ANAO National Audit Body Finds Compliance With Interwoven The Auditor-General, assisted by the ANAO, is responsible for undertaking audits of the fnancial statements and performance of Australian Government...
Summary: ...Metropolitan Police leverage social media to engage local community. Case study Metropolitan Police leverage social media to engage local community HP Autonomy solution enables UK’s leading police force to better engage the community and respond to local events Industry UK public sector Objective Create...
Summary: ...New South Wales Department of Environment and Climate Change - Case Study. “We have a large number of offices throughout NSW which generate a lot of varied content, ranging from park conditions to legislative information.” Her aim was to enable staff at those sites to update their own content. The...
Summary: ...the database tables, the quicker the access, and HP Database Archiving software has helped us keep down the size of the database tables in the main schemas.” When necessary, Tupperware N.A. now applies important patches to Oracle E-Business Suite 11i. Previously, because of complex customizations, Tupperware...
Summary: ...populous of California’s 58 counties. Like many municipalities, the County of San Diego (www.sdcounty.gov) meets the increased demands of a growing population by using information technology to support everything from fighting crime to maintaining public health and preserving the environment. 2 Case...
Summary: ...Gb fiber channel. “Data Protector has been running very well and is backing up our system like magic. We have seen phenomenal savings in both time and money, as the backup speed has improved and the system has been streamlined. It is the best data protection solution I have used.” – Derek McConnell,...
Summary: ...disparate databases at once, with a drill-down option to provide more in-depth records of a suspect’s crimes and status. Autonomy’s innovative and unique technology allows officers to create specific, repeatable searches, significantly reducing retrieval time and ensuring valuable data is not lost...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...or new content created in an enterprise. With this enhancement, more complex rules may be created such as the ability to extract the fileplan classification from text embedded in the body of an email. This will increase the number of situations where EDC can automatically process and classify content...
Summary: ...and leverage of the organization’s information assets as well as for fully FRCP-compliant search . Autonomy Connectors Autonomy Connectors are responsible for extracting content from any type of local or remote repository, importing the data into an IDX or an XML file, and then indexing the data into...
Summary: ...Autonomy Information Connectivity. Technical Brief Information Connectivity Autonomy Supports Virtually Any Format, Source and Language Every enterprise has a complex mix of off-the-shelf and custom applications, databases, information technologies and file formats. Autonomy is capable of aggregating...
Summary: ...and visibility of information that resides in an array of internal and external systems that form the core of the global capital markets. Users in audit, finance, legal, compliance and regulatory bodies all require greater visibility to the same set of information, but often to address differing obligations....
Summary: ...Server with Caching System Requirements Intel Pentium II PC 1GB RAM 30 GB Hard Drive Windows 2000 Server or Windows 2000 Advanced Server SQL or Oracle Server (if used with a local library) About Autonomy iManage Autonomy iManage is the leader in information management applications for the legal and professional...
Summary: ...Autonomy Global Capital Markets. Users in audit, finance, legal, compliance and regulatory bodies all require greater visibility to the same set of information, but often to address differing obligations. Autonomy’s unique ability to understand relevant information in context allows various constituencies...
Summary: ...DIH Information received from: Web Modules it can communicate with: DiSH, IDOL server™ NT Single Pentium 4 1.6 Ghz processor 512 MB RAM 10 GB hard disk recommended UNIX Single Pentium 4 1.6 Ghz processor 512 MB RAM 10 GB hard disk recommended For specific sizing requirements please consult the Autonomy...
Summary: ...the cost of care and practice in a manner which responsibly considers healthcare resource constraints. HDOs must oversee a standardized and efficient practice of medicine, computerize health records and incorporate analytics, and constantly evaluate available resources in order to allocate them in a manner...
Summary: ...Autonomy Introspect - Product Brief. In response to the stricter rules, organizations are attempting to use disparate tools for eDiscovery, never solving the problem holistically. As a result, time and money are being spent collecting too much information, moving information between systems, and utilizing...
Summary: ...Share information easily and efficiently. Documents can be quickly stored and retrieved without requiring professionals to fill out lengthy profile forms. • Streamlined profiling capabilities: Classify each document and email message with metadata tailored to your organization’s specific needs. Profile...
Summary: ...Brochure Protect your critical data and applicat.... Address today’s data protection challenges Achieving backup and recovery success in your enterprise environment is becoming more complex, and the nature of recovery is changing rapidly. To keep your business operating at its full potential, you need...
Summary: ...eliminating backup windows • IT staff time required to manage backup and recovery success With HP Data Protector, you can meet these challenges and: • Manage and protect thousands of branch offices economically and reliably • Achieve 24x7 business continuity by minimizing downtime for critical applications,...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...Legal Technology: Enhancing profitability through an economic crisis. Mobile users can access matter files and file documents via BlackBerry or the Web, and an offline capability lets practitioners download information prior to disconnecting from the network, then synchronise any changes easily on reconnection....
Summary: ...Responsible Information Management: Ensuring Data Privacy in the Enterprise. Many businesses have taken steps to limit the accessibility of sensitive corporate or customer information. This can include heightened security controls, permissions-based access, or limiting particular information to web-based...
Summary: ...with discovery of electronically stored information often result in settlements driven more by the cost of litigation than the actual merits of the case.5 In the absence of uniform national standards, “disparate local rules” emerged and a body of case law on discovery into electronically stored information...
Summary: ...ethical walls can come back to haunt a frm. In the event of legal discovery, the inability to produce requested records— including e-mails and other electronic content—can force a costly settlement even if an organization has done nothing wrong. In Zubulake v. UBS Warburg, a federal district court...
Summary: ...failures undoubtedly added to losses for many companies and investors. These failures, along with pressure placed on political and regulatory bodies, will lead to new compliance requirements of greater complexity. Entities not previously regulated will be subject to oversight, as will products that went...
Summary: ...administrators and end-users to efficiently archive and retrieve legacy data. With the widespread acceptance of e-mail and related communications has come increased scrutiny from regulators and other investigating bodies. The result is the need for careful e-mail management that satisfies the needs of...
Summary: ...The Business Process Management Guide for Government. Hard copies of each of the forms are retained for four weeks, ensuring that all of the data is accurate with the ability to attend to any discrepancies in the data file from the paper file. The Benefts of Cardiff SMS and the State of Hawaii have realized...
Summary: ...list • Autonomy Collaborative Classifier module, which creates a workflow in which the subject matter experts and knowledge engineers, as identified by the organization, collaborate in real-time to create, modify, distribute and manage taxonomies. As the classifications are created and managed by the...
Summary: ...of those receiving care are accurate, readily available when required and can be shared with those that have a need to know throughout the complex network of public sector services from health worker and medical staff to the emergency services and police. The directorate currently handles around 4700...
Summary: ...generate 10-15% growth when the economy is healthy. According to Gartner, the relevant market (Information Access Technology) amounted to US$1.1bn and is expected to increase by an average of 12% per year until 20132. However, this segment can be classified as discretionary spend as it is dependent on...
Summary: ...development in Russia within the context of changing foreign policy’ be classified as (i) Russian technology (ii) Russian foreign policy, or (iii) Russian economics? The decision process is both complex and time consuming and introduces yet more inconsistency, particularly when the sheer number of options...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.